17.4: Summary and Exercises
- Page ID
- 22291
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Beyond state corporation laws, federal statutes—most importantly, the Securities Act of 1933 and the Securities Exchange Act of 1934—regulate the issuance and trading of corporate securities. The federal definition of security is broad, encompassing most investments, even those called by other names.
The law does not prohibit risky stock offerings; it bans only those lacking adequate disclosure of risks. The primary means for realizing this goal is the registration requirement: registration statements, prospectuses, and proxy solicitations must be filed with the Securities and Exchange Commission (SEC). Penalties for violation of securities law include criminal fines and jail terms, and damages may be awarded in civil suits by both the SEC and private individuals injured by the violation of SEC rules. A 1977 amendment to the 1934 act is the Foreign Corrupt Practices Act, which prohibits an issuer from paying a bribe or making any other payment to foreign officials in order to gain business by inducing the foreign official to influence his government in favor of the US company. This law requires issuers to keep accurate sets of books reflecting the dispositions of their assets and to maintain internal accounting controls to ensure that transactions comport with management’s authorization.
The Securities Exchange Act of 1934 presents special hazards to those trading in public stock on the basis of inside information. One provision requires the reimbursement to the company of any profits made from selling and buying stock during a six-month period by directors, officers, and shareholders owning 10 percent or more of the company’s stock. Under Rule 10b-5, the SEC and private parties may sue insiders who traded on information not available to the general public, thus gaining an advantage in either selling or buying the stock. Insiders include company employees.
The Sarbanes-Oxley Act amended the 1934 act, creating more stringent penalties, increasing corporate regulation, and requiring greater transparency.
- Anne operated a clothing store called Anne’s Rags, Inc. She owned all of the stock in the company. After several years in the clothing business, Anne sold her stock to Louise, who personally managed the business. Is the sale governed by the antifraud provisions of federal securities law? Why?
- While waiting tables at a campus-area restaurant, you overhear a conversation between two corporate executives who indicate that their company has developed a new product that will revolutionize the computer industry. The product is to be announced in three weeks. If you purchase stock in the company before the announcement, will you be liable under federal securities law? Why?
- Eric was hired as a management consultant by a major corporation to conduct a study, which took him three months to complete. While working on the study, Eric learned that someone working in research and development for the company had recently made an important discovery. Before the discovery was announced publicly, Eric purchased stock in the company. Did he violate federal securities law? Why?
- While working for the company, Eric also learned that it was planning a takeover of another corporation. Before announcement of a tender offer, Eric purchased stock in the target company. Did he violate securities law? Why?
- The commercial lending department of First Bank made a substantial loan to Alpha Company after obtaining a favorable confidential earnings report from Alpha. Over lunch, Heidi, the loan officer who handled the loan, mentioned the earnings report to a friend who worked in the bank’s trust department. The friend proceeded to purchase stock in Alpha for several of the bank’s trusts. Discuss the legal implications.
- In Exercise 5, assume that a week after the loan to Alpha, First Bank financed Beta Company’s takeover of Alpha. During the financing negotiations, Heidi mentioned the Alpha earnings report to Beta officials; furthermore, the report was an important factor in Heidi’s decision to finance the takeover. Discuss the legal implications.
- In Exercise 6, assume that after work one day, Heidi told her friend in the trust department that Alpha was Beta’s takeover target. The friend proceeded to purchase additional stock in Alpha for a bank trust he administered. Discuss the legal implications.
- The issuance of corporate securities is governed by
- various federal statutes
- state law
- both of the above
- neither of the above
- The law that prohibits the payment of a bribe to foreign officials to gain business is called
- the Insider Trading Act
- the blue sky law
- the Foreign Corrupt Practices Act
- none of the above
- The primary means for banning stock offerings that inadequately disclose risks is
- the registration requirement
- SEC prohibition of risky stock offerings
- both of the above
- neither of the above
- To enforce its prohibition under insider trading, the SEC requires reimbursement to the company of any profits made from selling and buying stock during any six-month period by directors owing
- 60 percent or more of company stock
- 40 percent or more of company stock
- 10 percent or more of company stock
- none of the above
- Under Rule 10b-5, insiders include
- all company employees
- any person who possesses nonpublic information
- all tippees
- none of the above
- The purpose of the Dodd-Frank Act is to
- promote financial stability
- end “too big to fail”
- end bailouts
- protect against abusive financial services practices
- all of the above
- Answer
-
- 3
- 3
- 1
- 4
- 1
- 5